Starting from:

$30

Course Project Solution

Network optimization has been an important area in the current research in computer science and computer engineering. In this course project, you will implement a network routing protocol using the data structures and algorithms we have studied in class. This provides you with an opportunity to translate your theoretical understanding into a real-world practical computer program. Translating algorithmic ideas at a \higher level" of abstraction into real implementations in a particular programming language is not at all always trivial. The implementations often force you to work on more details of the algorithms, which sometimes may lead to much better understanding.




Your implementation should include the following parts:




Random Graph Generation. Write subroutines that generate two kinds of \ran-dom" undirected graphs of 5000 vertices.



In the rst graph G1, the average vertex degree is 6;




In the second graph G2, each vertex is adjacent to about 20% of the other vertices, which are randomly chosen;




Randomly assign positive weights to edges in the graphs.




Your graphs should be "random" enough. Therefore, in the graph G1, the pairs of vertices that are adjacent should be chosen randomly, and in the graph G2, the number of neighbors and the neighbors of a vertex should be chosen randomly. To make sure that your graphs are connected, I suggest that you start with a cycle that contains all vertices of the graphs, then add the rest edges randomly.




Heap Structure Write subroutines for the max-heap structure. In particular, your implementation should include subroutines for maximum, insert, and delete. See Homework #2, Problem 1.



Since the heap structure you implement will be used for a Dijkstra-style algorithm in the routing protocol, we suggest the following data structures in your implementation:




1









The vertices of a graph are named by integers 0, 1, : : :, 4999;




The heap is given by an array H[5000], where each element H[i] gives the name of a vertex in the graph;




The vertex \values" are given in another array D[5000]. Thus, to nd the value of a vertex H[i] in the heap, we can use D[H[i]].







Routing Algorithms Your algorithms are to solve the Max-Bandwidth-Path problem for which you need to nd a path of the maximum bandwidth between two vertices in a given weighted undirected graph. You should have three di erent versions of implementations:



An algorithm for Max-Bandwidth-Path based on a modi cation of Dijkstra’s algorithm without using a heap structure;




An algorithm for Max-Bandwidth-Path based on a modi cation of Dijkstra’s algorithm using a heap structure for fringes;




An algorithm for Max-Bandwidth-Path based on a modi cation of Kruskal’s al-gorithm, in which the edges are sorted by HeapSort.







Testing. Test you routing algorithms on 5 pairs of graphs, randomly generated using your subroutines implemented in Step 1. For each generated graph, pick at least 5 pairs of randomly selected source-destination vertices. For each source-destination pair (s; t) on a graph G, run each of the three algorithms on the pair (s; t) and the graph G, and record their running time (you should nd a proper way to \count" the running time of an algorithm).






Report. Write a report of at least 5 typed pages, which explains your implementation details, and discusses and analyzes the performance of your routing algorithms on di erent kinds of input graphs. The data you record in Step 4 for the algorithm performance should also be given here. Also, if possible, discuss any possible further improvements on data structures, algorithms, and implementations.






Further Research. You may consider also implementing, testing, and analyzing the linear-time algorithm for Max-Bandwidth-Path, which we have discussed in class. This requires signi cant extra work, including implementing Median-Finding, Connected-Component, and other necessary algorithms.



This item is not required, but will be interesting for the study of practical performance of this theoretically best algorithm for the problem.

























2

More products